2020
DOI: 10.17694/bajece.634104
|View full text |Cite
|
Sign up to set email alerts
|

Automated Fake Access Point Attack Detection and Prevention System with IoT Devices

Abstract: Wireless access points (APs), which allow many devices to be easily connected to the Internet, are widely used today because they offer the easiest way to connect to the Internet. With the development of the Internet of Things (IoT), WiFi networks are widely used in our homes, workplaces, social areas, campus areas. With the increase of WiFi networks, attacks on these networks are constantly increasing. In this study, an IoT-based approach to detect and prevent Fake Access point attacks frequently seen in WiFi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…There are many types of MITM attacks that attackers can use to exploit insecure applications and user data. Some of the most common types of MITM attacks include rogue access point attacks [109], address resolution protocol (ARP) spoofing [110], domain name system (DNS) spoofing [111], session hijacking [112], and SSL/TLS interception [113].…”
Section: Man-in-the-middle Attack (Mitm) [108]mentioning
confidence: 99%
“…There are many types of MITM attacks that attackers can use to exploit insecure applications and user data. Some of the most common types of MITM attacks include rogue access point attacks [109], address resolution protocol (ARP) spoofing [110], domain name system (DNS) spoofing [111], session hijacking [112], and SSL/TLS interception [113].…”
Section: Man-in-the-middle Attack (Mitm) [108]mentioning
confidence: 99%
“…This is done by making a broadcast similar to the SSID (Service Set Identifier) by the attacker. Then, the attacker allows the users to communicate with this SSID [19]. Our proposed protocol has immunity against this type of attack because it satisfies mutual authentication between the two shared parties (U and AP) as mentioned before.…”
Section: ) Fake Access Point Attackmentioning
confidence: 95%
“…In [13] the authors propose an IoT-based method to detect and prevent fake access point attacks in Wi-Fi networks. Utilizing a single board computer and a wireless antenna with a "Soft AP" feature, they conducted air scans to identify and mitigate fake AP broadcasts.…”
Section: Wi-fi Attack Detection Toolsmentioning
confidence: 99%

Automated Wi-Fi intrusion detection tool on 802.11 networks

Dimitris Koutras,
Panos Dimitrellos,
Panayiotis Kotzanikolaou
et al. 2024
ITU J-FET